Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 3 / 8
Total 237 questions

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

A.

RSA

B.

AES

C.

ECC

D.

DES

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A.

Construction and selection

B.

Site management

C.

Awareness training

D.

Access control

E.

Intrusion detection

F.

Personnel control

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a network-based IDS

B.

Install a host-based IDS

C.

Install a DMZ firewall

D.

Enable verbose logging on the firewall

Which of the following are used to suppress electrical and computer fires? Each correct answer represents a complete solution. Choose two.

A.

Halon

B.

Water

C.

CO2

D.

Soda acid

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Safeguard

B.

Annualized Rate of Occurrence (ARO)

C.

Single Loss Expectancy (SLE)

D.

Exposure Factor (EF)

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

A.

It relies upon a system of security associations.

B.

It provides key generation mechanisms.

C.

It authenticates communicating peers.

D.

It protects against threats, such as DoS attack, replay attack, etc.

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.

Disaster recovery plan

B.

Contingency plan

C.

Business Continuity plan

D.

Continuity of Operations plan

Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.

A.

MS-CHAP v2

B.

NTLM

C.

EAP-MD5

D.

EAP-TLS

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall